21st Century Learning and Teaching
586.6K views | +19 today
Follow
21st Century Learning and Teaching
Related articles to 21st Century Learning and Teaching as also tools...
Curated by Gust MEES
Your new post is loading...
Your new post is loading...

Popular Tags

Current selected tags: '2015', 'Cybersecurity'. Clear
Scooped by Gust MEES
Scoop.it!

CVE-Statistik: Viele Sicherheitslücken in Mac OS X, iOS und Flash gemeldet | CyberSecurity | Awareness | Apple

CVE-Statistik: Viele Sicherheitslücken in Mac OS X, iOS und Flash gemeldet | CyberSecurity | Awareness | Apple | 21st Century Learning and Teaching | Scoop.it
Eine Auswertung der CVE-Liste zeigt, für welche Programme und Betriebssysteme 2015 die meisten Sicherheitslücken gemeldet wurden. Wie sicher die Software ist, lässt sich daraus jedoch nicht ableiten.

Auf der wichtigsten Liste öffentlich bekannter Sicherheitslücken tauchten im Jahr 2015 besonders häufig Mac OS X, iOS und Flash auf. Das geht aus einer Auswertung von CVEDetails.com hervor, die auf der CVE-Liste (Common Vulnerabilities and Exposures) basiert.

Im Rahmen des CVE-Projektes vergeben wichtige Software-Hersteller wie Apple, Adobe, Microsoft und Mozilla eindeutige IDs für Sicherheitslücken, in Zusammenarbeit mit der Non-Profit-Organisation Mitre.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Gust MEES's insight:
Eine Auswertung der CVE-Liste zeigt, für welche Programme und Betriebssysteme 2015 die meisten Sicherheitslücken gemeldet wurden. Wie sicher die Software ist, lässt sich daraus jedoch nicht ableiten.

Auf der wichtigsten Liste öffentlich bekannter Sicherheitslücken tauchten im Jahr 2015 besonders häufig Mac OS X, iOS und Flash auf. Das geht aus einer Auswertung von CVEDetails.com hervor, die auf der CVE-Liste (Common Vulnerabilities and Exposures) basiert.

Im Rahmen des CVE-Projektes vergeben wichtige Software-Hersteller wie Apple, Adobe, Microsoft und Mozilla eindeutige IDs für Sicherheitslücken, in Zusammenarbeit mit der Non-Profit-Organisation Mitre.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


No comment yet.
Scooped by Gust MEES
Scoop.it!

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To | 21st Century Learning and Teaching | Scoop.it

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To . Internet safety is the responsibility of EVERYONE! It isn't actually THAT difficult to apply a healthy behavior on the internet to stay secure, one needs to have some reflexes, daily reflexes... Let us call them CyberHygiene…

Gust MEES's insight:

CyberHygiene For Beginners, Easy To follow Steps For Anyone | Reflexes To Get Used To . Internet safety is the responsibility of EVERYONE! It isn't actually THAT difficult to apply a healthy behavior on the internet to stay secure, one needs to have some reflexes, daily reflexes... Let us call them CyberHygiene…


No comment yet.
Scooped by Gust MEES
Scoop.it!

Quels risques de sécurité se cachent dans vos cadeaux de Noël cette année ? | Internet of Things | IoT

Quels risques de sécurité se cachent dans vos cadeaux de Noël cette année ? | Internet of Things | IoT | 21st Century Learning and Teaching | Scoop.it

Selon gizmag, nos chères têtes blondes s’attendent aujourd’hui à ce que les jouets offerts puissent se connecter à Internet et être couplés à des appareils intelligents, leur permettant ainsi d’accéder aux dernières tendances technologiques en date, parfois même avant leurs parents. Toutefois, chers parents, bien que nous ne puissions que vous recommander de réfléchir à deux fois avant d’acheter à vos enfants un jouet connecté, soyez vous aussi vigilants car, comme vous pourrez le lire ci-dessous, les risques de sécurité ne concernent pas uniquement les gadgets pour enfants.

L’Internet des objets (IdO) devient rapidement partie intégrante de notre réalité car un plus grand nombre de nos objets du quotidien renferment maintenant de l’électronique, des logiciels, des capteurs ou sont capables de se connecter au réseau, leur permettant ainsi de recueillir et d’échanger des données. Combien de ces objets, pensez-vous alors, peuvent se transformer en vrais chevaux de Troie ? La guerre de Troie prit fin quand les Grecs firent preuve de malice pour entrer dans la ville de Troie, cachant des soldats dans un énorme cheval de bois. Les Grecs firent semblant d’embarquer sur leurs navires et de prendre le large tandis que les Troyens, peu méfiants, s’emparaient du cheval en signe de victoire, le faisant entrer dans la ville. Plus tard cette nuit-là, les Grecs sortirent tant bien que mal dudit cheval de bois et ouvrirent les portes de la ville au reste de l’armée grecque afin que cette dernière pénètre dans la ville et la détruise. Quels attaquants peuvent potentiellement surgir de vos cadeaux de Noël ?


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Gust MEES's insight:

Selon gizmag, nos chères têtes blondes s’attendent aujourd’hui à ce que les jouets offerts puissent se connecter à Internet et être couplés à des appareils intelligents, leur permettant ainsi d’accéder aux dernières tendances technologiques en date, parfois même avant leurs parents. Toutefois, chers parents, bien que nous ne puissions que vous recommander de réfléchir à deux fois avant d’acheter à vos enfants un jouet connecté, soyez vous aussi vigilants car, comme vous pourrez le lire ci-dessous, les risques de sécurité ne concernent pas uniquement les gadgets pour enfants.

L’Internet des objets (IdO) devient rapidement partie intégrante de notre réalité car un plus grand nombre de nos objets du quotidien renferment maintenant de l’électronique, des logiciels, des capteurs ou sont capables de se connecter au réseau, leur permettant ainsi de recueillir et d’échanger des données. Combien de ces objets, pensez-vous alors, peuvent se transformer en vrais chevaux de Troie ? La guerre de Troie prit fin quand les Grecs firent preuve de malice pour entrer dans la ville de Troie, cachant des soldats dans un énorme cheval de bois. Les Grecs firent semblant d’embarquer sur leurs navires et de prendre le large tandis que les Troyens, peu méfiants, s’emparaient du cheval en signe de victoire, le faisant entrer dans la ville. Plus tard cette nuit-là, les Grecs sortirent tant bien que mal dudit cheval de bois et ouvrirent les portes de la ville au reste de l’armée grecque afin que cette dernière pénètre dans la ville et la détruise. Quels attaquants peuvent potentiellement surgir de vos cadeaux de Noël ?


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



No comment yet.
Scooped by Gust MEES
Scoop.it!

New PC malware loads before Windows, is virtually impossible to detect | CyberSecurity

New PC malware loads before Windows, is virtually impossible to detect | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
A new form of attack has brought a long-standing criminal malware suite to an NSA level of sophistication.


newly revealed malware that has been in use since at least the beginning of this year has been dubbed a “bootkit,” for its ability to infect a computer at the most fundamental level, running when the computer boots to actually load before the operating system itself. It’s part of the widespread “Nemesis” malware suite, and while it is currently aimed at financial institutions, the inclusion of bootkit functionality in a relatively “mass market” solution means the powerful form of cyber infiltration is coming to a much wider array of victims.

The issue is that since a bootkit can load in malware programs before Windows itself loads, Windows processes have a hard time identifying malicious activity, and an even harder time removing it. Completely reinstalling the OS won’t do it — this is rather like the NSA attacks that can resist even a total format of the drive, but so far as we know those mostly at least require hardware infiltration of the target. In this case, this purely software virus can install itself behind your computers eyes, and thus never be seen.


Gust MEES's insight:
A new form of attack has brought a long-standing criminal malware suite to an NSA level of sophistication.


newly revealed malware that has been in use since at least the beginning of this year has been dubbed a “bootkit,” for its ability to infect a computer at the most fundamental level, running when the computer boots to actually load before the operating system itself. It’s part of the widespread “Nemesis” malware suite, and while it is currently aimed at financial institutions, the inclusion of bootkit functionality in a relatively “mass market” solution means the powerful form of cyber infiltration is coming to a much wider array of victims.

The issue is that since a bootkit can load in malware programs before Windows itself loads, Windows processes have a hard time identifying malicious activity, and an even harder time removing it. Completely reinstalling the OS won’t do it — this is rather like the NSA attacks that can resist even a total format of the drive, but so far as we know those mostly at least require hardware infiltration of the target. In this case, this purely software virus can install itself behind your computers eyes, and thus never be seen.


Tony Guzman's curator insight, December 9, 2015 3:32 PM

This "new" malware may present a significant challenge to IT teams in the coming months.

Scooped by Gust MEES
Scoop.it!

New training material by ENISA on Mobile Threats Incident Handling and Artefact analysis | CyberSecurity

New training material by ENISA on Mobile Threats Incident Handling and Artefact analysis | CyberSecurity | 21st Century Learning and Teaching | Scoop.it

ENISA rolls out a continuation to its most used and valued technical training material, on Mobile Threats Incident Handling and Artefact analysis

The material released is two-fold:

  • The new content familiarises trainees with concepts, tools, and techniques used for incident handling on mobile devices, and offers a methodology on how to react - properly and timely - when the necessity comes.
  • The new artefact analysis training material helps information security analysts to correctly analyse malware and understand its potential functionality, enabling the organisation to create proper countermeasures and mitigation plans.


Gust MEES's insight:

ENISA rolls out a continuation to its most used and valued technical training material, on Mobile Threats Incident Handling and Artefact analysis

The material released is two-fold:

  • The new content familiarises trainees with concepts, tools, and techniques used for incident handling on mobile devices, and offers a methodology on how to react - properly and timely - when the necessity comes.
  • The new artefact analysis training material helps information security analysts to correctly analyse malware and understand its potential functionality, enabling the organisation to create proper countermeasures and mitigation plans.


No comment yet.
Scooped by Gust MEES
Scoop.it!

Internet: La sécurité en ligne spéciale seniors au Luxembourg | DigitalCitiZEN | DigitalLuxembourg | ICT

Internet: La sécurité en ligne spéciale seniors au Luxembourg | DigitalCitiZEN | DigitalLuxembourg | ICT | 21st Century Learning and Teaching | Scoop.it
Bee Secure a créé un site web dédié spécialement aux seniors, afin de les informer et les conseiller quant à une utilisation plus maîtrisée d'internet.


Learn more / Mehr erfahren / En savoir plus :


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Gust MEES's insight:

Bee Secure a créé un site web dédié spécialement aux seniors, afin de les informer et les conseiller quant à une utilisation plus maîtrisée d'internet.


Learn more / Mehr erfahren / En savoir plus :


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/




No comment yet.
Scooped by Gust MEES
Scoop.it!

Why IoT Security Is So Critical | Internet of Things | CyberSecurity | Privacy

Why IoT Security Is So Critical | Internet of Things | CyberSecurity | Privacy | 21st Century Learning and Teaching | Scoop.it

Twenty years ago, if you told me my phone could be used to steal the password to my email account or to take a copy of my fingerprint data, I would’ve laughed at you and said you watch too much James Bond. But today, if you tell me that hackers with malicious intents can use my toaster to break into my Facebook account, I will panic and quickly pull the plug from the evil appliance.

What is evident is that the IoT will become an important part of our lives very soon, and its security is one of the major issues that must be addressed via active participation by the entire global tech community. Will we be able to harness this most-hyped, emerging technology that will undoubtedly revolutionize the world, or will we end up opening a Pandora’s Box that will spiral the world into a new age of mayhem and chaos? Let’s hope for the former.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Gust MEES's insight:

Twenty years ago, if you told me my phone could be used to steal the password to my email account or to take a copy of my fingerprint data, I would’ve laughed at you and said you watch too much James Bond. But today, if you tell me that hackers with malicious intents can use my toaster to break into my Facebook account, I will panic and quickly pull the plug from the evil appliance.

What is evident is that the IoT will become an important part of our lives very soon, and its security is one of the major issues that must be addressed via active participation by the entire global tech community. Will we be able to harness this most-hyped, emerging technology that will undoubtedly revolutionize the world, or will we end up opening a Pandora’s Box that will spiral the world into a new age of mayhem and chaos? Let’s hope for the former.


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Senioren erleben Live Hacking on stage | CyberSecurity | Digital CitiZEN | SilverSurfer

Senioren erleben Live Hacking on stage | CyberSecurity | Digital CitiZEN | SilverSurfer | 21st Century Learning and Teaching | Scoop.it

Für die fünfte Edition der Seniorenmesse Top50+ hatten sich wieder viele Senioren am 03. und 04. Oktober im Casino 2000 in Mondorf eingefunden. Reges Interesse fand die Live Hacking Demo on stage, die von Michael Hamm, Sicherheitsexperte bei CIRCL- Computer Incident Response Center Luxembourg, durchgeführt wurde. Anhand von konkreten Beispielen demonstrierte er, wie Cyberkriminelle vorgehen um Passwörter knacken.


Gust MEES's insight:

Für die fünfte Edition der Seniorenmesse Top50+ hatten sich wieder viele Senioren am 03. und 04. Oktober im Casino 2000 in Mondorf eingefunden. Reges Interesse fand die Live Hacking Demo on stage, die von Michael Hamm, Sicherheitsexperte bei CIRCL- Computer Incident Response Center Luxembourg, durchgeführt wurde. Anhand von konkreten Beispielen demonstrierte er, wie Cyberkriminelle vorgehen um Passwörter knacken.


No comment yet.
Scooped by Gust MEES
Scoop.it!

The dark side of wearables: How they're secretly jeopardizing your security and privacy | CyberSecurity

The dark side of wearables: How they're secretly jeopardizing your security and privacy  | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
If you want to be considered an individual and not just a data point, then it's in your interest to protect your privacy."
Josh Lifton


"The information that's contained on your wearable ... is worth ten times that of a credit card on a black market."Gary Davis


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/



Gust MEES's insight:
If you want to be considered an individual and not just a data point, then it's in your interest to protect your privacy."
Josh Lifton


"The information that's contained on your wearable ... is worth ten times that of a credit card on a black market."Gary Davis


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=wearables


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


STELnetwork #STEL's curator insight, October 7, 2015 8:36 PM

#mdis #stel #technology #sg50 #stelnetwork #since1956 #education #cybersecurity

Scooped by Gust MEES
Scoop.it!

A dangerous silent AirDrop attack is threatening Apple users | CyberSecurity | NobodyIsPerfect

A dangerous silent AirDrop attack is threatening Apple users | CyberSecurity | NobodyIsPerfect | 21st Century Learning and Teaching | Scoop.it
A new evil vulnerability affecting the AirDrop service could be exploited by attackers to silently infect iPhones and Apple Macs.

Versions prior to the latest Apple OS version, the newborn iOS 9, are affected by a serious AirDrop Bug. The AirDrop Bug could be exploited by hackers to take full control of Apple iPhone or Mac machines.

The AirDrop Bug has been disclosed by the Australian security researcher Mark Dowd, AirDrop is a proprietary service that enables the transfer of documents among supported Macintosh computers and iOS devices.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security



Gust MEES's insight:
A new evil vulnerability affecting the AirDrop service could be exploited by attackers to silently infect iPhones and Apple Macs.

Versions prior to the latest Apple OS version, the newborn iOS 9, are affected by a serious AirDrop Bug. The AirDrop Bug could be exploited by hackers to take full control of Apple iPhone or Mac machines.

The AirDrop Bug has been disclosed by the Australian security researcher Mark Dowd, AirDrop is a proprietary service that enables the transfer of documents among supported Macintosh computers and iOS devices.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security



Gust MEES's curator insight, September 23, 2015 11:37 AM

A new evil vulnerability affecting the AirDrop service could be exploited by attackers to silently infect iPhones and Apple Macs.

Versions prior to the latest Apple OS version, the newborn iOS 9, are affected by a serious AirDrop Bug. The AirDrop Bug could be exploited by hackers to take full control of Apple iPhone or Mac machines.

The AirDrop Bug has been disclosed by the Australian security researcher Mark Dowd, AirDrop is a proprietary service that enables the transfer of documents among supported Macintosh computers and iOS devices.


Learn more:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security/?tag=ZERODIUM


Scooped by Gust MEES
Scoop.it!

BEESECURE-Internet Survivalguide 2015 [pdf] | Luxembourg | ICT

BEESECURE-Internet Survivalguide 2015 [pdf] | Luxembourg | ICT 

.

Learn more:

.

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

.

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

.

https://gustmees.wordpress.com/2015/07/19/learning-path-for-professional-21st-century-learning-by-ict-practice/


Gust MEES's insight:

BEESECURE-Internet Survivalguide 2015 [pdf] | Luxembourg | ICT 

.

Learn more:

.

https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/

.

https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

.

https://gustmees.wordpress.com/2015/07/19/learning-path-for-professional-21st-century-learning-by-ict-practice/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Die Top 5 Sicherheitslücken in der Firmen-IT - CANCOM.info

Die Top 5 Sicherheitslücken in der Firmen-IT - CANCOM.info | 21st Century Learning and Teaching | Scoop.it
Christian Fredrikson (CEO des Sicherheitsanbieters F-Secure) verrät im exklusiven Interview die drei größten Sicherheitslücken in deutschen Unternehmen


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/securite-pc-et-internet


Gust MEES's insight:

Christian Fredrikson (CEO des Sicherheitsanbieters F-Secure) verrät im exklusiven Interview die drei größten Sicherheitslücken in deutschen Unternehmen.


Mehr erfahren / En savoir plus / Learn more:


http://www.scoop.it/t/securite-pc-et-internet



No comment yet.
Scooped by Gust MEES
Scoop.it!

Internet der Dinge – das größte Botnet aller Zeiten?

Internet der Dinge – das größte Botnet aller Zeiten? | 21st Century Learning and Teaching | Scoop.it
Das Internet der Dinge, also die umfassende Vernetzung von Sensoren aller Art, birgt gravierende Sicherheitsrisiken. So könnte daraus bald das größte Botnetz aller Zeiten entstehen.
Das Internet der Dinge (Internet of Things, IoT) ist derzeit der vermutlich angesagteste Hype in der IT-Welt. Von der umfassenden Vernetzung von Endgeräten aller Art versprechen sich viele Manager neue Geschäftschancen. Nach Schätzungen der Experten von McKinsey führt das Internet der Dinge zu einem wirtschaftlichen Mehrwert von bis zu 1.100 Milliarden Dollar in den kommenden zehn Jahren. Aber wie sieht es mit der Sicherheit aus?

Angriffe über Thingbots: In den vergangenen Jahren gab es bereits mehrere Attacken auf IoT-Sensoren und -Geräte.
(Quelle: Globalsign ) Lea Toms, Regional Marketing Manager bei Globalsign, warnt vor gigantischen Netzwerken aus IoT-Sensoren, die von Angreifern zu Botnetzen verknüpft werden können, um beispielsweise kritische Infrastrukturen anzugreifen oder um Schadsoftware zu verbreiten. Sie nennt diese Netze „Thingbots“: „Je mehr das Internet der Dinge an Bedeutung gewinnt, desto mehr Geräte und Dinge sind potenziell gefährdet, Teil eines Thingbots werden.


Mehr erfahren / En savoir plus /  Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars

Gust MEES's insight:
Das Internet der Dinge, also die umfassende Vernetzung von Sensoren aller Art, birgt gravierende Sicherheitsrisiken. So könnte daraus bald das größte Botnetz aller Zeiten entstehen.
Das Internet der Dinge (Internet of Things, IoT) ist derzeit der vermutlich angesagteste Hype in der IT-Welt. Von der umfassenden Vernetzung von Endgeräten aller Art versprechen sich viele Manager neue Geschäftschancen. Nach Schätzungen der Experten von McKinsey führt das Internet der Dinge zu einem wirtschaftlichen Mehrwert von bis zu 1.100 Milliarden Dollar in den kommenden zehn Jahren. Aber wie sieht es mit der Sicherheit aus?

Angriffe über Thingbots: In den vergangenen Jahren gab es bereits mehrere Attacken auf IoT-Sensoren und -Geräte.
(Quelle: Globalsign ) Lea Toms, Regional Marketing Manager bei Globalsign, warnt vor gigantischen Netzwerken aus IoT-Sensoren, die von Angreifern zu Botnetzen verknüpft werden können, um beispielsweise kritische Infrastrukturen anzugreifen oder um Schadsoftware zu verbreiten. Sie nennt diese Netze „Thingbots“: „Je mehr das Internet der Dinge an Bedeutung gewinnt, desto mehr Geräte und Dinge sind potenziell gefährdet, Teil eines Thingbots werden.


Mehr erfahren / En savoir plus /  Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


No comment yet.
Scooped by Gust MEES
Scoop.it!

Software with the most vulnerabilities in 2015: Mac OS X, iOS, and Flash

Software with the most vulnerabilities in 2015: Mac OS X, iOS, and Flash | 21st Century Learning and Teaching | Scoop.it
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Gust MEES's insight:
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Gust MEES's curator insight, January 1, 2016 5:13 PM
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Umberto Orefice's curator insight, January 2, 2016 11:09 AM

Good to know..

Dennis Swender's curator insight, March 13, 2016 10:07 AM
Which software had the most publicly disclosed vulnerabilities this year? The winner is none other than Apple’s Mac OS X, with 384 vulnerabilities. The runner-up? Apple’s iOS, with 375 vulnerabilities.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/apple-mac-ios4-ipad-iphone-and-in-security


http://www.scoop.it/t/securite-pc-et-internet


Scooped by Gust MEES
Scoop.it!

Future of the Connected Home: Security in the Internet of Things | CyberSecurity | IoT

Guarding against vulnerabilities and smart security best practices are essential to protecting the connected home from cybercrime. Take a look at common risks …


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Gust MEES's insight:
Guarding against vulnerabilities and smart security best practices are essential to protecting the connected home from cybercrime. Take a look at common risks …


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


delmy's curator insight, December 17, 2015 10:27 AM

#sceuned15 interesante , para poner en practica

delmy's curator insight, December 18, 2015 6:31 PM

#SCEUNED15 , hablando de seguridad en la red.

Scooped by Gust MEES
Scoop.it!

What security risks are hidden in your Christmas presents this year? | CyberSecurity | Internet of Things

What security risks are hidden in your Christmas presents this year? | CyberSecurity | Internet of Things | 21st Century Learning and Teaching | Scoop.it

According to gizmag, today’s kids expect their toys to connect to the internet, pair with smart devices, and let them join in the latest tech trends, often before their parents. However, while there are good reasons parents should think twice before buying tech toys for their kids, as you will read below, security risks aren’t just confined to gadgets for children.

As the concept of the Internet of Things (IoT) rapidly becomes reality as more and more objects are embedded with electronics, software, sensors and network connectivity that enables them to collect and exchange data, how many of your Christmas gifts could be the equivalent of the Trojan Horse? It was a decisive end to the Trojan War when the Greeks used subterfuge to enter the city of Troy, hiding some of their army inside a huge wooden horse. After pretending to sail away, the unsuspecting Trojans pulled the horse into their city as a victory trophy. Later that night the Greek force crept out of the horse and opened the city gates for the rest of the Greek army to enter and destroy the city. What attackers could be potentially unleashed in your Christmas gifts?


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


Gust MEES's insight:

According to gizmag, today’s kids expect their toys to connect to the internet, pair with smart devices, and let them join in the latest tech trends, often before their parents. However, while there are good reasons parents should think twice before buying tech toys for their kids, as you will read below, security risks aren’t just confined to gadgets for children.

As the concept of the Internet of Things (IoT) rapidly becomes reality as more and more objects are embedded with electronics, software, sensors and network connectivity that enables them to collect and exchange data, how many of your Christmas gifts could be the equivalent of the Trojan Horse? It was a decisive end to the Trojan War when the Greeks used subterfuge to enter the city of Troy, hiding some of their army inside a huge wooden horse. After pretending to sail away, the unsuspecting Trojans pulled the horse into their city as a victory trophy. Later that night the Greek force crept out of the horse and opened the city gates for the rest of the Greek army to enter and destroy the city. What attackers could be potentially unleashed in your Christmas gifts?


Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


https://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Negotiators of the European Parliament, the Council and the Commission have agreed on the first EU-wide legislation on cybersecurity.

Negotiators of the European Parliament, the Council and the Commission have agreed on the first EU-wide legislation on cybersecurity.

Information systems – computing resources such as networks and databases that enable essential services, businesses and the internet to function – are affected by an increasing number of security incidents. These incidents can have different origins, including technical failures, unintentional mistakes, natural disasters or malicious attacks. They could disrupt the supply of essential services we take for granted such as electricity, water, healthcare, or transport services.
It is a priority for the Commission to help prevent these incidents, and in case they occur, provide the most efficient response. This is why the Commission put forward in 2013 a proposal for a Directive to ensure a high common level of network and information security (NIS) in the EU. The European Parliament and the Luxembourg Presidency of the EU Council of Ministers last night reached an agreement on the rules which will:
improve cybersecurity capabilities in Member States
improve Member States' cooperation on cybersecurity
require operators of essential services in the energy, transport, banking and healthcare sectors, and providers of key digital services like search engines and cloud computing, to take appropriate security measures and report incidents to the national authorities
Gust MEES's insight:

Negotiators of the European Parliament, the Council and the Commission have agreed on the first EU-wide legislation on cybersecurity.

Information systems – computing resources such as networks and databases that enable essential services, businesses and the internet to function – are affected by an increasing number of security incidents. These incidents can have different origins, including technical failures, unintentional mistakes, natural disasters or malicious attacks. They could disrupt the supply of essential services we take for granted such as electricity, water, healthcare, or transport services.
It is a priority for the Commission to help prevent these incidents, and in case they occur, provide the most efficient response. This is why the Commission put forward in 2013 a proposal for a Directive to ensure a high common level of network and information security (NIS) in the EU. The European Parliament and the Luxembourg Presidency of the EU Council of Ministers last night reached an agreement on the rules which will:
improve cybersecurity capabilities in Member States
improve Member States' cooperation on cybersecurity
require operators of essential services in the energy, transport, banking and healthcare sectors, and providers of key digital services like search engines and cloud computing, to take appropriate security measures and report incidents to the national authorities


No comment yet.
Scooped by Gust MEES
Scoop.it!

7 reasons why IoT device hacks keep happening | Internet Of Things | CyberSecurity | Privacy

7 reasons why IoT device hacks keep happening | Internet Of Things | CyberSecurity | Privacy | 21st Century Learning and Teaching | Scoop.it

Let’s skip the part where we talk about how many fancy IoT devices people will have in 5 years. We can also skip the part where we talk about the benefits of these devices.


Why is it that these connected devices are being hacked over and over again?


The list below, while not exhaustive, explains some of the reasons why these new connected devices are so easy to hack and why we’re likely to see more hacks in the future.

  1. MVP mindset
  2. Usability > security
  3. Lack of skills and resources
  4. Ship and forget mindset
  5. You (the user)
  6. Complex supply chain
  7. Cybercrime as a service


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Gust MEES's insight:

Let’s skip the part where we talk about how many fancy IoT devices people will have in 5 years. We can also skip the part where we talk about the benefits of these devices.


Why is it that these connected devices are being hacked over and over again?


The list below, while not exhaustive, explains some of the reasons why these new connected devices are so easy to hack and why we’re likely to see more hacks in the future.

  1. MVP mindset
  2. Usability > security
  3. Lack of skills and resources
  4. Ship and forget mindset
  5. You (the user)
  6. Complex supply chain
  7. Cybercrime as a service


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


No comment yet.
Scooped by Gust MEES
Scoop.it!

Wie sicher ist das Internet der Dinge? | Internet of Things | IoT | IoE | CyberSecurity

Wie sicher ist das Internet der Dinge? | Internet of Things | IoT | IoE | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
Das Internet of Things entwickelt sich rasend schnell – die Hacker halten Schritt. Nun muss das Engineering bei der IoT-Absicherung eng mit den Security-Experten der IT zusammenarbeiten.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars

Gust MEES's insight:
Das Internet of Things entwickelt sich rasend schnell – die Hacker halten Schritt. Nun muss das Engineering bei der IoT-Absicherung eng mit den Security-Experten der IT zusammenarbeiten.


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/securite-pc-et-internet/?tag=Linux.Wifatch


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Router


http://www.scoop.it/t/securite-pc-et-internet/?tag=smart-TV


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


No comment yet.
Scooped by Gust MEES
Scoop.it!

One step closer to an encrypted web. Next stop: HTTPS for all | Encryption | Privacy | CyberHygiene

One step closer to an encrypted web. Next stop: HTTPS for all | Encryption | Privacy | CyberHygiene | 21st Century Learning and Teaching | Scoop.it



All major web browsers are now trusting Let's Encrypt's free security certificates, bringing a more secure and private web that much closer.








Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION


http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's insight:

All major web browsers are now trusting Let's Encrypt's free security certificates, bringing a more secure and private web that much closer.




Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=ENCRYPTION


http://www.scoop.it/t/securite-pc-et-internet/?tag=ENCRYPTION


http://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/

No comment yet.
Scooped by Gust MEES
Scoop.it!

How (and why) to set up a VPN today | Privacy | CyberSecurity | eSkills

How (and why) to set up a VPN today | Privacy | CyberSecurity | eSkills | 21st Century Learning and Teaching | Scoop.it
Investing in a good VPN is one of the smartest steps you can take toward improving your online privacy. We'll show you how to do it right.


Learn more:


https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN


http://www.scoop.it/t/securite-pc-et-internet/?tag=VPN


Gust MEES's insight:
Investing in a good VPN is one of the smartest steps you can take toward improving your online privacy. We'll show you how to do it right.


Learn more:


https://gustmees.wordpress.com/2013/05/27/dangers-of-wifi-in-public-places/


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=VPN


http://www.scoop.it/t/securite-pc-et-internet/?tag=VPN


No comment yet.
Scooped by Gust MEES
Scoop.it!

Cybersecurity: What Needs to Change Now | ICT | eSkills

Cybersecurity: What Needs to Change Now | ICT | eSkills | 21st Century Learning and Teaching | Scoop.it

October is National Cyber Security Awareness Month in the United States. This year’s campaign emphasizes cybersecurity as part of a deliberate strategy and a shared responsibility, not just a checkbox item.


Learn more:


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's insight:

October is National Cyber Security Awareness Month in the United States. This year’s campaign emphasizes cybersecurity as part of a deliberate strategy and a shared responsibility, not just a checkbox item.


Learn more:


https://gustmees.wordpress.com/2014/11/18/why-cybersecurity-starts-at-home-and-is-concerning-all-of-us/


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Wendy Zaruba's curator insight, October 2, 2015 8:48 AM

October is National Cyber Security Awareness Month in the US.  Great article, what do you know or what part do you play in Cyber Security?

Scooped by Gust MEES
Scoop.it!

In the New Wild West, a Computer May Be More Dangerous Than a Gun | ICT | CyberSecurity | Awareness

In the New Wild West, a Computer May Be More Dangerous Than a Gun | ICT | CyberSecurity | Awareness | 21st Century Learning and Teaching | Scoop.it

We’re at the Wild West stage of the Internet: the pioneers have come and gone, the big operators are building their mines and ranches, and now comes the plague of carpetbaggers. Just as children once grew up surrounded by guns, but somehow managed to survive, our children now are growing up in the mine-strewn trench warfare landscape of the Internet. It can in fact be navigated with some degree of safety, but not by the incautious.


It falls to us – whether we are teachers, parents or security engineers – to bring up the next generation with some hope of survival. The challenge is to simultaneously encourage exploration and enforce security, or if that’s not available, at least some degree of safety. Our culture weathered the frontier era more or less successfully, so I’m inclined to believe we can deal with the threats of the Internet. The challenge is to do it with minimal damage.


Learn more:


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


Gust MEES's insight:

We’re at the Wild West stage of the Internet: the pioneers have come and gone, the big operators are building their mines and ranches, and now comes the plague of carpetbaggers. Just as children once grew up surrounded by guns, but somehow managed to survive, our children now are growing up in the mine-strewn trench warfare landscape of the Internet. It can in fact be navigated with some degree of safety, but not by the incautious.


It falls to us – whether we are teachers, parents or security engineers – to bring up the next generation with some hope of survival. The challenge is to simultaneously encourage exploration and enforce security, or if that’s not available, at least some degree of safety. Our culture weathered the frontier era more or less successfully, so I’m inclined to believe we can deal with the threats of the Internet. The challenge is to do it with minimal damage.


Learn more:


https://gustmees.wordpress.com/2012/10/11/learning-basics-of-cyber-security-by-easy-to-follow-steps/


https://gustmees.wordpress.com/2012/11/29/cyber-hygiene-ict-hygiene-for-population-education-and-business/


No comment yet.
Scooped by Gust MEES
Scoop.it!

Hackers are coming for your home — here's how to protect yourself | Internet of Things | IoT | CyberSecurity

Hackers are coming for your home — here's how to protect yourself | Internet of Things | IoT | CyberSecurity | 21st Century Learning and Teaching | Scoop.it



You may want to think twice before you install that security camera.






Mehr erfahren / En savoir plus /  Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Gust MEES's insight:

You may want to think twice before you install that security camera.




Mehr erfahren / En savoir plus /  Learn more:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


No comment yet.
Scooped by Gust MEES
Scoop.it!

'Sometimes I'm terrified' of the Internet of Things, says father of the Internet | CyberSecurity

'Sometimes I'm terrified' of the Internet of Things, says father of the Internet | CyberSecurity | 21st Century Learning and Teaching | Scoop.it
Vint Cerf is known as a "father of the Internet," and like any good parent, he worries about his offspring -- most recently, the IoT.

"Sometimes I'm terrified by it," he said in a news briefing Monday at the Heidelberg Laureate Forum in Germany. "It's a combination of appliances and software, and I'm always nervous about software -- software has bugs."

The Internet of Things will offer the ability to manage many of the appliances we depend on, acknowledged Cerf, who won the Turing Award in 2004. With its ability to continuously monitor such devices, it also promises new insight into our use of resources, he said.

Devices such as Google's Nest thermostat, for instance, can "help me decide how well or poorly I've chosen my lifestyle to minimize cost and my use of resources -- it can be an important tool," he said.

As with so many technological tools, however, there are plenty of potential downsides. Safety is one of them.

Cerf is now vice president and chief Internet evangelist at Google, but you won't find him enjoying any of the massage chairs the company provides for its employees. "I know they're run by software -- I worry they will fold up on me," he quipped.

As more such appliances are run by software, people will be increasingly reliant on programmers' ability to write good code, he pointed out.

"It's fraught with issues, some technical and some legislative," he said. "Who is liable when an appliance doesn't work the way it should, and what if that's a software question?"


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars


Gust MEES's insight:

Vint Cerf is known as a "father of the Internet," and like any good parent, he worries about his offspring -- most recently, the IoT.

"Sometimes I'm terrified by it," he said in a news briefing Monday at the Heidelberg Laureate Forum in Germany. "It's a combination of appliances and software, and I'm always nervous about software -- software has bugs."

The Internet of Things will offer the ability to manage many of the appliances we depend on, acknowledged Cerf, who won the Turing Award in 2004. With its ability to continuously monitor such devices, it also promises new insight into our use of resources, he said.

Devices such as Google's Nest thermostat, for instance, can "help me decide how well or poorly I've chosen my lifestyle to minimize cost and my use of resources -- it can be an important tool," he said.

As with so many technological tools, however, there are plenty of potential downsides. Safety is one of them.

Cerf is now vice president and chief Internet evangelist at Google, but you won't find him enjoying any of the massage chairs the company provides for its employees. "I know they're run by software -- I worry they will fold up on me," he quipped.

As more such appliances are run by software, people will be increasingly reliant on programmers' ability to write good code, he pointed out.


"It's fraught with issues, some technical and some legislative," he said. "Who is liable when an appliance doesn't work the way it should, and what if that's a software question?"


Learn more / En savoir plus / Mehr erfahren:


http://www.scoop.it/t/21st-century-learning-and-teaching/?tag=Internet+of+Things


http://www.scoop.it/t/securite-pc-et-internet/?tag=Internet+of+things


http://globaleducationandsocialmedia.wordpress.com/2014/01/21/why-is-it-a-must-to-have-basics-knowledge-of-cyber-security-in-a-connected-technology-world/


http://www.scoop.it/t/securite-pc-et-internet/?tag=Cars



No comment yet.